Generating a Cyber Confidence Index Using Black Box Vulnerability and Breach Assessment

Project Overview

 

In today's world, device interconnectivity is increasingly growing. As a result of this development, it is more important than ever to maintain protection at various levels so that people who use the internet will feel secure. Any business that provides services over the internet must ensure that its infrastructure is free of vulnerabilities that could jeopardize its customers' interest and prove financially costly.

 

This project proposes the concept of a cyber confidence index which defines the level of trust that consumers have on a company’s cyber services and products based on the efforts that a company takes in mitigating its cyber risk. The company receives a full scan report which highlights all severe vulnerabilities and data breaches so that it can patch them. The entire process is automated from start to finish to circumvent any middlemen such as security companies or staff that cost small companies time and money thereby hindering their security progress.

 

Student’s Quote

“It is often said that in security, a defense expert must be right all the time whereas a bad actor must be right just once. This applies to all kinds of security fields including cybersecurity. That one time where a hacker gets into your network can cost you your reputation and money. However, implementing security can be a daunting and heavy task especially if you do not know how much to spend or where to begin. Why not ease the entire lengthy process of security assessments into one handy tool? This is what we are trying to achieve with this project” - Ayesh Towheed

 

 

“The essence of the cyber confidence index is not only understanding derivation and how each parameter influences the results, recognizing perspectives of both testing auditors and the company’s attempt in vulnerability scanning is also part of the project’s achievement. Even though using Machine Learning for cyber risk interpretation gives us a relatively novel solution to the work, we as developers should also consider which part suits its advantage and how we handle tradeoffs of its limit” - Khanin Udomchoksakul

Researcher
M. Ayesh Towheed
Student
CMKL University
K. Udomchoksakul
Student
CMKL University
Advisor
Akkarit Sangpetch
Assistant Professor
CMKL University
Orathai Sangpetch
Assistant Professor
CMKL University
Chat Thongsong
The Securities and Exchange Commission
Nakharin Limrungsi
The Securities and Exchange Commission